Deck 5: Searches for Electronically Stored Information and Electronic Surveillance

Full screen (f)
exit full mode
Question
Neither Title III of the Omnibus Crime Control and Safe Streets Act of 1968 nor the Fourth Amendment requires law enforcement to _____.

A) obtain a judicial order to intercept wire, oral, or electronic communications
B) obtain judicial authorization to covertly enter the premises to install a listening device
C) first receive administrative authorization to apply for an interception order
D) conduct themselves in a way that minimizes the interception of communications not subject to the interception order
Use Space or
up arrow
down arrow
to flip the card.
Question
_____ is most accurately defined as searches using wiretaps, bugs, or other devices to overhear conversation or obtain other kinds of information?

A) Electronic surveillance
B) Covert surveillance
C) Covert intelligence
D) Cyber surveillance
Question
Under the exigent circumstances exception, a law enforcement officer must apply for an interception order _____ after the interception has occurred or begins to occur.

A) immediately
B) within forty-eight hours
C) as soon as practicable
D) when prudent as deemed by the officer
Question
Which statement concerning time limitations on the forensic examination phase of electronically stored information is correct?

A) The police are only allowed 10 days to extract the evidence.
B) The time period allowed to obtain the evidence is the same for forensic searches and more traditional searches.
C) Law enforcement is allowed a shorter time period to obtain the evidence than normally allowed under a traditional search warrant.
D) Rule 41 does not require magistrates to specify a time limit because the amount of time is unpredictable.
Question
The term _____ transfer refers to a transfer containing the human voice at any point between, and including, the point of origin and the point of reception?

A) aural
B) electronic
C) intercept
D) oral
Question
The first phase of searches of Electronically Stored Information (ESI) includes _____.

A) entering the place(s) housing the devices on which data are stored
B) seizing the devices on which the data may be stored as well as devices linked via networks
C) examining the seized devices for the data described in a warrant
D) providing the devices to forensic computer specialists who search for data described in a warrant
Question
In Berger v. New York (1967) the issue was the constitutionality of a New York statute that authorized electronic surveillance pursuant to a judicial warrant. In the case, the Court:

A) validated the law because the government had probable cause and the intrusion was reasonably related to what the government was looking for
B) validated the law because it properly limited the nature, scope, or duration of the electronic surveillance
C) invalidated the law because the government did not establish probable cause
D) invalidated the law because it failed to properly limit the nature, scope, or duration of the electronic surveillance
Question
In Olmstead v. United States (1928), the Court held that wiretapping of telephone conversations _____.

A) is covered by the Fourth Amendment, but does not violate it
B) was not covered by the Fourth Amendment
C) is covered by the Fourth Amendment, and is a violation of it
D) was only a partial violation of the Fourth Amendment
Question
In the case of Olmstead v. United States, the Court decided that the practice of wiretapping was not covered by the Fourth Amendment, primarily because _____.

A) the person had no reasonable expectation of privacy in the home
B) the evidence was obtained only by hearing (and did not involve tangible items) so the interception of a conversation could not qualify as a seizure
C) the Fourth Amendment protects people, but not places
D) there was no legitimate remedy for the alleged violation at the time, as the exclusionary rule did not yet exist yet
Question
A _____ wiretap allows for interception of a particular suspect's communications wherever they are made, dispensing with the normal requirement that interceptions be limited to a fixed location.

A) geographical
B) roving
C) non-specific
D) roaming
Question
Materials that are made inaccessible to anyone without a special court order are said to be _____.

A) under lock and key
B) on-hold
C) under seal
D) en todos
Question
The exacting process of computer forensic examination includes _____.

A) read protecting the device
B) connecting the computer to a network
C) imaging the hard drive
D) deconstructing the hard drive
Question
Within a reasonable time, but not later than _____ days after the termination of the period of an order, an inventory must be served on the persons named in the order and on such other parties to intercepted communications as the judge determines in the interest of justice.

A) twenty
B) thirty
C) sixty
D) ninety
Question
_____ concerns the use of scientific methods toward the preservation, collection, and interpretation of digital evidence from digital sources.

A) Forensic computer information systems
B) Computer forensics
C) Electronic surveillance
D) Computer science
Question
The statutory-based exclusionary rule in Title III of the Omnibus Crime Control and Safe Streets Act of 1968 applies to _____.

A) wire, oral, and electronic communications
B) electronic and wire communications, but not oral communications
C) electronic and oral communications, but not wire communications
D) wire and oral communications, but not electronic communications
Question
Title III of the Omnibus Crime Control and Safe Streets Act of 1968 refers to a "person who was a party to any intercepted" wire or oral communication or "a person against whom the interception was directed" as _____.

A) suspect
B) aggrieved
C) felonious
D) victimized
Question
What specific legislation authorizes courts to conduct closed reviews of surveillance materials?

A) The Foreign Intelligence Surveillance Act (FISA)
B) Stored Communications Act (SCA)
C) Electronic communications Privacy Act (ECPA)
D) Freedom of Information Act (FOIA)
Question
When one party to a communication consents to the interception of the communication, _____.

A) Title III of the Wiretap Act prevents the use of the communication in court against another party, but the Fourth Amendment allows use of the communication
B) the Fourth Amendment prevents the use of the communication in court against another party, but Title III of the Wiretap Act allows use of the communication in court against another party
C) both the Fourth Amendment and Title III of the Wiretap Act prevent use of the communication in court against another party
D) neither Title III of the Wiretap Act nor the Fourth Amendment prevents the use of the communication in court against another party
Question
Title III of the Omnibus Crime Control and Safe Streets Act of 1968 _____.

A) requires authorization by a judge in the location of the tapped telephone
B) allows the issuance of interception orders for any felony offense
C) permits taps even when ordinary investigative procedures have not been exhausted
D) requires that the order be executed "as soon as practicable"
Question
What term describes tools for hiding, destroying, or counterfeiting the information relied on by digital forensics experts?

A) anti forensics
B) Trojans
C) wipes
D) back doors
Question
If a conversation takes place in public where other parties can overhear the conversation, there is no reasonable expectation of privacy. However, any recording of such a conversation would violate Title III of the Wiretap Act.
Question
Title III of the Wiretap Act does not cover video surveillance using video cameras that record only images and not aural communications.
Question
The Foreign Intelligence Surveillance Act does not require a showing of probable cause to believe that a crime has been or is being committed.
Question
Title III of the Wiretap Act applies to private searches and seizures of wire, oral, or electronic communications.
Question
Searches and seizures concerning foreign intelligence and antiterrorism efforts are authorized and regulated by the Foreign Intelligence and Racketeering Act (FIRA).
Question
Under the _____ exception, victims of computer attacks by hackers can authorize law enforcement officials to intercept wire or electronic communications of a computer trespasser, if specific statutory requirements are satisfied.

A) computer trespasser
B) provider
C) public access
D) exceptional privilege
Question
Before the enactment of the _____, interception orders for wire communications in computer hacking investigations were not permitted.

A) Omnibus Crime Control and Safe Streets Act of 1968
B) FISA
C) Violent Crime Control and Law Enforcement Act of 1994
D) USA PATRIOT Act
Question
Many courts require the government to return seized computers and data storage equipment at a particular time as a condition of issuing the warrant.
Question
Title III of the Omnibus Crime Control and Safe Streets Act of 1968 does not apply to the use of electronic devices emitting signals that enable law enforcement officials to track the location of objects and persons. Why?

A) Title III only covers incidental interception of communication.
B) By their very nature, the devices are mobile and this not covered.
C) These devices are incapable of transmitting speech.
D) The devices were not in existence in 1968.
Question
Prior to the passing of Title III of the Omnibus Crime Control and Safe Streets Act of 1968, the United States Government utilized a "national security exception" to conduct warrantless electronic surveillance of foreign powers. In 1978, the Foreign Intelligence Surveillance Act (FISA) was passed as a result of the _____.

A) Watergate scandal
B) abuses of the Vietnam war
C) Iranian Hostage Crisis
D) violent acts by student groups
Question
Title III of the Wiretap Act applies to the use of electronic devices emitting signals that enable law enforcement officials to track the location of objects and persons.
Question
Although e-mail has replaced telephone communication in many spheres, it is not considered a 'wire communication' for purposes of Title III of the Wiretap Act.
Question
Under the _____ exception, an employee or agent of a communications service entity may intercept and disclose communications to protect the rights or property of the provider as part of the ordinary course of business.

A) computer trespasser
B) public access
C) provider
D) exigent circumstances
Question
Who determines the composition of the Foreign Intelligence Surveillance Court (FISC)?

A) the Associate Justices of the U.S. Supreme Court.
B) the Speaker of the House.
C) the Attorney General of the U.S.
D) the Chief Justice of the U.S. Supreme Court.
Question
Title III of the Omnibus Crime Control and Safe Streets Act of 1968 specifically exempts _____ from the warrant requirement.

A) buildings
B) cell phones
C) tone-only pagers
D) answering machines
Question
When law enforcement officers intercept communications that relate to offenses other than those specified in the interception order, the government may use the evidence of these other crimes only if _____.

A) the evidence was observed in plain view
B) the evidence could have been discovered through an independent source
C) another application is made to a court "as soon as practicable" for a determination that the interception complied with Title III requirements
D) the evidence is testimonial in nature
Question
What is the difference between a pen register and a trap-and-trace device?

A) A pen register records incoming addressing information (such as caller ID information); whereas a trap-and-trace device records outgoing addressing information (such as numbers dialed from a phone).
B) A pen register records outgoing addressing information (such as numbers dialed from a phone); whereas a trap-and-trace device records incoming addressing information (such as caller ID information).
C) A pen register intercepts communication; whereas a trap-and-trace device does not intercept communication.
D) A pen register does not intercept communication; whereas a trap-and-trace device intercepts communication.
Question
Many courts have upheld requirements that forensic analysis of the computers had to be conducted within 90 days of the physical search.
Question
Title III of the Omnibus Crime Control and Safe Streets Act of 1968 is often referred to as the _____.

A) Digital Act
B) Wiretap Act
C) Electronics Act
D) Surveillance Act
Question
The Department of Justice cautions that limitations on search methodologies have the potential to seriously impair the government's ability to uncover electronic evidence.
Question
Briefly describe how the Title III of the Omnibus Crime Control and Safe Streets Acts of 1968 originated.
Question
Compare and contrast an interception order under Title III of the Wiretap Act and an ordinary search warrant.
Question
What is meant by sealing/putting under seal and why this is done?
Question
Briefly describe what the Foreign Intelligence Surveillance Act (FISA) is and does.
Question
Explain the conflicting demands for more effective law enforcement and individual privacy rights relevant to electronic surveillance.
Question
Computer __________ uses the scientific methods for the preservation, collection, and analysis of digital sources of information.
Question
A(n) ___________ is defined as "…a transfer containing the human voice at any point between and including the point of origin and the point of reception."
Question
Dropbox, SkyDrive and SugarSync are companies that offer remote computing services, where one can digitally store their information "in the __________ ."
Question
When one party to a communication consents to the interception of the communication, neither Title III of the Wiretap Act nor the Fourth Amendment prevents the use of the communication in court against another party to the communication. This is called __________.
Question
The __________ allows a communications service provider to intercept and disclose communications to protect the rights or property of the provider as part of the ordinary course of business.
Question
Congress created a special Article III court to review FISA applications called the __________.
Question
Title III of the Wiretap Act provides authority for designated officials to intercept wire, oral, or electronic communications without a prior interception order if an emergency situation exists that involves immediate danger of death or serious physical injury to any person. This is referred to as the __________.
Question
Assess the requirements that some courts impose on applications for search warrants for electronically stored information. Identify the limitations in place and explain the rationale of these limitations.
Question
Outline the two stage process used for most searches of electronically stored information.
Question
Searches conducted using wiretaps, bugs, or other devices to overhear conversations or obtain other kinds of information are collectively referred to as __________ surveillance.
Question
What impact has "cloud" technology had upon law enforcement in terms of electronic surveillance? Explain your reasoning.
Question
The case of Dalia v. United States ruled that a judicial order to place an eavesdropping device by law enforcement in a business or residence need not have a separate order specifically authorizing the __________ entry to install the device.
Question
The __________ provides that any person may intercept an electronic communication made through a system that is configured so that the communication is readily accessible to the general public.
Question
Explain the jurisdiction and procedures of the Foreign Intelligence Surveillance Court (FISC).
Question
List a minimum of three forms of wiretaps. Describe each.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/60
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: Searches for Electronically Stored Information and Electronic Surveillance
1
Neither Title III of the Omnibus Crime Control and Safe Streets Act of 1968 nor the Fourth Amendment requires law enforcement to _____.

A) obtain a judicial order to intercept wire, oral, or electronic communications
B) obtain judicial authorization to covertly enter the premises to install a listening device
C) first receive administrative authorization to apply for an interception order
D) conduct themselves in a way that minimizes the interception of communications not subject to the interception order
B
2
_____ is most accurately defined as searches using wiretaps, bugs, or other devices to overhear conversation or obtain other kinds of information?

A) Electronic surveillance
B) Covert surveillance
C) Covert intelligence
D) Cyber surveillance
A
3
Under the exigent circumstances exception, a law enforcement officer must apply for an interception order _____ after the interception has occurred or begins to occur.

A) immediately
B) within forty-eight hours
C) as soon as practicable
D) when prudent as deemed by the officer
B
4
Which statement concerning time limitations on the forensic examination phase of electronically stored information is correct?

A) The police are only allowed 10 days to extract the evidence.
B) The time period allowed to obtain the evidence is the same for forensic searches and more traditional searches.
C) Law enforcement is allowed a shorter time period to obtain the evidence than normally allowed under a traditional search warrant.
D) Rule 41 does not require magistrates to specify a time limit because the amount of time is unpredictable.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
5
The term _____ transfer refers to a transfer containing the human voice at any point between, and including, the point of origin and the point of reception?

A) aural
B) electronic
C) intercept
D) oral
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
6
The first phase of searches of Electronically Stored Information (ESI) includes _____.

A) entering the place(s) housing the devices on which data are stored
B) seizing the devices on which the data may be stored as well as devices linked via networks
C) examining the seized devices for the data described in a warrant
D) providing the devices to forensic computer specialists who search for data described in a warrant
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
7
In Berger v. New York (1967) the issue was the constitutionality of a New York statute that authorized electronic surveillance pursuant to a judicial warrant. In the case, the Court:

A) validated the law because the government had probable cause and the intrusion was reasonably related to what the government was looking for
B) validated the law because it properly limited the nature, scope, or duration of the electronic surveillance
C) invalidated the law because the government did not establish probable cause
D) invalidated the law because it failed to properly limit the nature, scope, or duration of the electronic surveillance
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
8
In Olmstead v. United States (1928), the Court held that wiretapping of telephone conversations _____.

A) is covered by the Fourth Amendment, but does not violate it
B) was not covered by the Fourth Amendment
C) is covered by the Fourth Amendment, and is a violation of it
D) was only a partial violation of the Fourth Amendment
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
9
In the case of Olmstead v. United States, the Court decided that the practice of wiretapping was not covered by the Fourth Amendment, primarily because _____.

A) the person had no reasonable expectation of privacy in the home
B) the evidence was obtained only by hearing (and did not involve tangible items) so the interception of a conversation could not qualify as a seizure
C) the Fourth Amendment protects people, but not places
D) there was no legitimate remedy for the alleged violation at the time, as the exclusionary rule did not yet exist yet
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
10
A _____ wiretap allows for interception of a particular suspect's communications wherever they are made, dispensing with the normal requirement that interceptions be limited to a fixed location.

A) geographical
B) roving
C) non-specific
D) roaming
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
11
Materials that are made inaccessible to anyone without a special court order are said to be _____.

A) under lock and key
B) on-hold
C) under seal
D) en todos
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
12
The exacting process of computer forensic examination includes _____.

A) read protecting the device
B) connecting the computer to a network
C) imaging the hard drive
D) deconstructing the hard drive
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
13
Within a reasonable time, but not later than _____ days after the termination of the period of an order, an inventory must be served on the persons named in the order and on such other parties to intercepted communications as the judge determines in the interest of justice.

A) twenty
B) thirty
C) sixty
D) ninety
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
14
_____ concerns the use of scientific methods toward the preservation, collection, and interpretation of digital evidence from digital sources.

A) Forensic computer information systems
B) Computer forensics
C) Electronic surveillance
D) Computer science
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
15
The statutory-based exclusionary rule in Title III of the Omnibus Crime Control and Safe Streets Act of 1968 applies to _____.

A) wire, oral, and electronic communications
B) electronic and wire communications, but not oral communications
C) electronic and oral communications, but not wire communications
D) wire and oral communications, but not electronic communications
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
16
Title III of the Omnibus Crime Control and Safe Streets Act of 1968 refers to a "person who was a party to any intercepted" wire or oral communication or "a person against whom the interception was directed" as _____.

A) suspect
B) aggrieved
C) felonious
D) victimized
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
17
What specific legislation authorizes courts to conduct closed reviews of surveillance materials?

A) The Foreign Intelligence Surveillance Act (FISA)
B) Stored Communications Act (SCA)
C) Electronic communications Privacy Act (ECPA)
D) Freedom of Information Act (FOIA)
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
18
When one party to a communication consents to the interception of the communication, _____.

A) Title III of the Wiretap Act prevents the use of the communication in court against another party, but the Fourth Amendment allows use of the communication
B) the Fourth Amendment prevents the use of the communication in court against another party, but Title III of the Wiretap Act allows use of the communication in court against another party
C) both the Fourth Amendment and Title III of the Wiretap Act prevent use of the communication in court against another party
D) neither Title III of the Wiretap Act nor the Fourth Amendment prevents the use of the communication in court against another party
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
19
Title III of the Omnibus Crime Control and Safe Streets Act of 1968 _____.

A) requires authorization by a judge in the location of the tapped telephone
B) allows the issuance of interception orders for any felony offense
C) permits taps even when ordinary investigative procedures have not been exhausted
D) requires that the order be executed "as soon as practicable"
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
20
What term describes tools for hiding, destroying, or counterfeiting the information relied on by digital forensics experts?

A) anti forensics
B) Trojans
C) wipes
D) back doors
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
21
If a conversation takes place in public where other parties can overhear the conversation, there is no reasonable expectation of privacy. However, any recording of such a conversation would violate Title III of the Wiretap Act.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
22
Title III of the Wiretap Act does not cover video surveillance using video cameras that record only images and not aural communications.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
23
The Foreign Intelligence Surveillance Act does not require a showing of probable cause to believe that a crime has been or is being committed.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
24
Title III of the Wiretap Act applies to private searches and seizures of wire, oral, or electronic communications.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
25
Searches and seizures concerning foreign intelligence and antiterrorism efforts are authorized and regulated by the Foreign Intelligence and Racketeering Act (FIRA).
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
26
Under the _____ exception, victims of computer attacks by hackers can authorize law enforcement officials to intercept wire or electronic communications of a computer trespasser, if specific statutory requirements are satisfied.

A) computer trespasser
B) provider
C) public access
D) exceptional privilege
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
27
Before the enactment of the _____, interception orders for wire communications in computer hacking investigations were not permitted.

A) Omnibus Crime Control and Safe Streets Act of 1968
B) FISA
C) Violent Crime Control and Law Enforcement Act of 1994
D) USA PATRIOT Act
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
28
Many courts require the government to return seized computers and data storage equipment at a particular time as a condition of issuing the warrant.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
29
Title III of the Omnibus Crime Control and Safe Streets Act of 1968 does not apply to the use of electronic devices emitting signals that enable law enforcement officials to track the location of objects and persons. Why?

A) Title III only covers incidental interception of communication.
B) By their very nature, the devices are mobile and this not covered.
C) These devices are incapable of transmitting speech.
D) The devices were not in existence in 1968.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
30
Prior to the passing of Title III of the Omnibus Crime Control and Safe Streets Act of 1968, the United States Government utilized a "national security exception" to conduct warrantless electronic surveillance of foreign powers. In 1978, the Foreign Intelligence Surveillance Act (FISA) was passed as a result of the _____.

A) Watergate scandal
B) abuses of the Vietnam war
C) Iranian Hostage Crisis
D) violent acts by student groups
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
31
Title III of the Wiretap Act applies to the use of electronic devices emitting signals that enable law enforcement officials to track the location of objects and persons.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
32
Although e-mail has replaced telephone communication in many spheres, it is not considered a 'wire communication' for purposes of Title III of the Wiretap Act.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
33
Under the _____ exception, an employee or agent of a communications service entity may intercept and disclose communications to protect the rights or property of the provider as part of the ordinary course of business.

A) computer trespasser
B) public access
C) provider
D) exigent circumstances
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
34
Who determines the composition of the Foreign Intelligence Surveillance Court (FISC)?

A) the Associate Justices of the U.S. Supreme Court.
B) the Speaker of the House.
C) the Attorney General of the U.S.
D) the Chief Justice of the U.S. Supreme Court.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
35
Title III of the Omnibus Crime Control and Safe Streets Act of 1968 specifically exempts _____ from the warrant requirement.

A) buildings
B) cell phones
C) tone-only pagers
D) answering machines
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
36
When law enforcement officers intercept communications that relate to offenses other than those specified in the interception order, the government may use the evidence of these other crimes only if _____.

A) the evidence was observed in plain view
B) the evidence could have been discovered through an independent source
C) another application is made to a court "as soon as practicable" for a determination that the interception complied with Title III requirements
D) the evidence is testimonial in nature
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
37
What is the difference between a pen register and a trap-and-trace device?

A) A pen register records incoming addressing information (such as caller ID information); whereas a trap-and-trace device records outgoing addressing information (such as numbers dialed from a phone).
B) A pen register records outgoing addressing information (such as numbers dialed from a phone); whereas a trap-and-trace device records incoming addressing information (such as caller ID information).
C) A pen register intercepts communication; whereas a trap-and-trace device does not intercept communication.
D) A pen register does not intercept communication; whereas a trap-and-trace device intercepts communication.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
38
Many courts have upheld requirements that forensic analysis of the computers had to be conducted within 90 days of the physical search.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
39
Title III of the Omnibus Crime Control and Safe Streets Act of 1968 is often referred to as the _____.

A) Digital Act
B) Wiretap Act
C) Electronics Act
D) Surveillance Act
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
40
The Department of Justice cautions that limitations on search methodologies have the potential to seriously impair the government's ability to uncover electronic evidence.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
41
Briefly describe how the Title III of the Omnibus Crime Control and Safe Streets Acts of 1968 originated.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
42
Compare and contrast an interception order under Title III of the Wiretap Act and an ordinary search warrant.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
43
What is meant by sealing/putting under seal and why this is done?
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
44
Briefly describe what the Foreign Intelligence Surveillance Act (FISA) is and does.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
45
Explain the conflicting demands for more effective law enforcement and individual privacy rights relevant to electronic surveillance.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
46
Computer __________ uses the scientific methods for the preservation, collection, and analysis of digital sources of information.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
47
A(n) ___________ is defined as "…a transfer containing the human voice at any point between and including the point of origin and the point of reception."
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
48
Dropbox, SkyDrive and SugarSync are companies that offer remote computing services, where one can digitally store their information "in the __________ ."
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
49
When one party to a communication consents to the interception of the communication, neither Title III of the Wiretap Act nor the Fourth Amendment prevents the use of the communication in court against another party to the communication. This is called __________.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
50
The __________ allows a communications service provider to intercept and disclose communications to protect the rights or property of the provider as part of the ordinary course of business.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
51
Congress created a special Article III court to review FISA applications called the __________.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
52
Title III of the Wiretap Act provides authority for designated officials to intercept wire, oral, or electronic communications without a prior interception order if an emergency situation exists that involves immediate danger of death or serious physical injury to any person. This is referred to as the __________.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
53
Assess the requirements that some courts impose on applications for search warrants for electronically stored information. Identify the limitations in place and explain the rationale of these limitations.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
54
Outline the two stage process used for most searches of electronically stored information.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
55
Searches conducted using wiretaps, bugs, or other devices to overhear conversations or obtain other kinds of information are collectively referred to as __________ surveillance.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
56
What impact has "cloud" technology had upon law enforcement in terms of electronic surveillance? Explain your reasoning.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
57
The case of Dalia v. United States ruled that a judicial order to place an eavesdropping device by law enforcement in a business or residence need not have a separate order specifically authorizing the __________ entry to install the device.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
58
The __________ provides that any person may intercept an electronic communication made through a system that is configured so that the communication is readily accessible to the general public.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
59
Explain the jurisdiction and procedures of the Foreign Intelligence Surveillance Court (FISC).
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
60
List a minimum of three forms of wiretaps. Describe each.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 60 flashcards in this deck.